[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2791-1 tryton-client -- missing input sanitization

ID: oval:org.secpod.oval:def:601141Date: (C)2013-11-05   (M)2022-10-10
Class: PATCHFamily: unix




Cedric Krier discovered that the Tryton client does not sanitize the file extension supplied by the server when processing reports. As a result, a malicious server could send a report with a crafted file extension that causes the client to write any local file to which the user running the client has write access.

Platform:
Debian 7.0
Debian 6.0
Product:
tryton-client
Reference:
DSA-2791-1
CPE    3
cpe:/a:tryton:tryton-client
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies